A is for Acronym
Shields Up!
S3kr8 M3ssaG3$
Data, data, and more data!!!
The Internets
100

What main protocol is used for securely transmitting webpages on the internet?

Bonus - Identify the two specific acronyms that are associated with this main protocol which provide the appropriate level of security. ($100 per correct answer)

What is HTTPS? (HyperText Transfer Protocol Secure) 

Bonus: TLS and SSL (transport layer security and secure sockets layer)

100

What is the type of cyber attack that floods a server with traffic to make it unavailable to users?

What is a DDoS attack?

100

What term describes the process of converting plaintext into unreadable ciphertext to protect sensitive information.

What is encryption?

100

What term describes the extra information stored with a file, such as the time a photo was taken?

What is metadata?

100

What term describes the ability of the internet to keep running even when part of it fails due to a natural disaster or a cable being severed?

What is fault tolerance?

200

What acronym stands for the system that translates human-friendly domain names that people type into numerical IP addresses for the computer to understand?

What is DNS? (Domain Name System)

200

What type of malicious software is designed to trick users into giving up personal information, often via fake emails or websites?

What is phishing?
200

What is the highest number of guesses a person would need to make in order to crack a Caesar cipher?

What is 26?

200

What type of compression removes some data permanently to reduce file size?

What is lossy compression?

200

What property of the internet's design improves its reliability by having multiple routes for data to travel in order to get from its origin to its destination?

What is redundancy?

300

What main internet protocol is responsible for breaking data into packets and ensuring they arrive in the correct order?

What is TCP (or TCP/IP protocol)?

300

What type of malware secretly records a user’s keystrokes to steal passwords and other sensitive data?

What is keylogging?

300

What type of encryption is used widely on the internet because it is asymmetric, meaning that the computer sending the message uses a different set of keys than the computer receiving the message?

What is public key encryption?

300

What term describes a method of gathering data or completing a task by relying on large numbers of people contributing small amounts of work?

What is crowdsourcing?

300

What term describes the devices that forward data on the internet, acting as traffic controllers and determining the best path for it to travel?

What is a router?

400

Tim Berners Lee is the British computer scientist credited for developing the World Wide Web, publishing the very first website, and for developing what programming language used to program websites?

What is HTML? (HyperText Markup Language)

400

What type of malware embeds its code into existing files and programs and replicates itself in a computer system?

What is a computer virus?

400

What term describes the trusted organizations who issue digital certificates to verify website authenticity?

What are certificate authorities?

400
What type of file compression is most appropriate for when the receiver of a message needs to restore the file completely to its original size, such as a high-resolution image for a billboard?

What is lossless compression?

400

What two terms identify the original version of IP addresses as well as the new version of IP addresses used for new devices that connect to the internet?

Bonus $100 - write out a valid example of either of these terms.

What are IPv4 and IPv6?

100.55.255.193

ae90:12ff:09b3:652a:00ff:3490:12e3:9090

500

What acronym refers to the protocol that, unlike TCP, is used when speed is more important than accuracy, such as in video streaming or online gaming?

What is UDP? (User Datagram Protocol)

500

What term describes using emotional manipulation and deception in order to get someone to click on a link or to willingly hand over sensitive information?

What is social engineering?

500

What type of encryption method uses the same key for both encryption and decryption?

What is symmetric encryption?

500

What organization provides various licenses for artists and content creators who wish to share their work online, potentially for others to use?

What is the Creative Commons?

500

What term describes the community of researchers and ordinary people who use the internet to conduct research and collect data on a number of research projects related to the environment, space, water quality, and other topics?

What is citizen scientists?